Date: Fri, 17 Sep 1999 16:12:24 -0400 From: Keith Stevenson <k.stevenson@louisville.edu> To: freebsd-security@freebsd.org Subject: Re: CERT amd advisory Message-ID: <19990917161224.A5524@homer.louisville.edu> In-Reply-To: <Pine.BSF.4.10.9909171337410.35608-100000@dt014nb6.san.rr.com>; from Doug on Fri, Sep 17, 1999 at 01:42:06PM -0700 References: <Pine.BSF.4.10.9909171337410.35608-100000@dt014nb6.san.rr.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, Sep 17, 1999 at 01:42:06PM -0700, Doug wrote: > INRE CERT Advisory CA-99.12 - Buffer Overflow in amd, I'm > wondering if it's being contemplated to MFC the recent update to amd (to > the non-vulnerable version) prior to 3.3-Release CD's being cut? I know > it's a big change, but I think it might be worth it. Also, FYI the URL for > the FreeBSD advisory on this topic doesn't seem to be on the FTP site yet. I seem to recall the 3.3 Release Notes stating that this problem was fixed. -- Keith Stevenson System Programmer - Data Center Services - University of Louisville k.stevenson@louisville.edu PGP key fingerprint = 4B 29 A8 95 A8 82 EA A2 29 CE 68 DE FC EE B6 A0 To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19990917161224.A5524>